Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 08:04

General

  • Target

    e351668d68d45749607c1a6cfb1de480N.exe

  • Size

    67KB

  • MD5

    e351668d68d45749607c1a6cfb1de480

  • SHA1

    5c5419d549d690406ea5a8f3791d0927db999584

  • SHA256

    1fbd5101492ab9a490ccf0f925c0e672858a6ff31aeba78c217481366ef62a2a

  • SHA512

    4be86887e25f9f7811c819f1b61f61109fd9c3cffc453b0eb4cb04514bab4aa834103a8bcc28ae5c79d28fbaeec46419302fb116f99aee5ca1d64360be4dcae6

  • SSDEEP

    1536:EgXsfgWQN1kYsRxWTg3PwSWe991Rdolpdz6JAkAT:1tWYfGATvPe9slp+ApT

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 2 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 8 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e351668d68d45749607c1a6cfb1de480N.exe
    "C:\Users\Admin\AppData\Local\Temp\e351668d68d45749607c1a6cfb1de480N.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1352
    • \??\c:\windows\system\explorer.exe
      c:\windows\system\explorer.exe
      2⤵
      • Modifies WinLogon for persistence
      • Modifies visiblity of hidden/system files in Explorer
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1716
      • \??\c:\windows\system\spoolsv.exe
        c:\windows\system\spoolsv.exe SE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2736
        • \??\c:\windows\system\svchost.exe
          c:\windows\system\svchost.exe
          4⤵
          • Modifies WinLogon for persistence
          • Modifies visiblity of hidden/system files in Explorer
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2724
          • \??\c:\windows\system\spoolsv.exe
            c:\windows\system\spoolsv.exe PR
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            PID:2764
          • C:\Windows\SysWOW64\at.exe
            at 08:06 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2652
          • C:\Windows\SysWOW64\at.exe
            at 08:07 /interactive /every:M,T,W,Th,F,S,Su c:\windows\system\svchost.exe
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1676

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\mrsys.exe

          Filesize

          67KB

          MD5

          f23e298e411934479fadfc91239817f1

          SHA1

          0112be0069266ddffcfce6c58bb967a8715b1e3c

          SHA256

          bf508ffb1b27f06a4aa0c9c5c0a337d20045ac952c1dd93223dabc91c247d8f4

          SHA512

          6a7111455ced3361b26dabc5302db4861ace506c49a002d41a0b90580a6beefdcc7cd39f57f13b7e807022d280575429c00a061bdcc229a81398379e0c0b76ab

        • C:\Windows\system\explorer.exe

          Filesize

          67KB

          MD5

          2e53505b5c2ab1a777b9ddd2653b7d13

          SHA1

          b1e3295c6b3d7599d5d54e21c691c089a880d9ee

          SHA256

          bf5d1d9ed6185b8ea0dadd8c6446ed8968f11775302fad4e0ab52889497a23b2

          SHA512

          a17769e778c6860e1eb9dee50e41480d37385b34660d98737ccc5a76f79bd232454ec2595841459cc1bbf8127544efe599095a440caaabd9f4e4534a7542f41a

        • \Windows\system\spoolsv.exe

          Filesize

          67KB

          MD5

          1b6a37931c7d67600a7ba81be4770a3b

          SHA1

          dd21980ede33952e6ac51fbb85d96a2a430e2073

          SHA256

          3a30570c72e91ce9639c0344d1cf435ab803afca627fbb01b584aa5c0ff8a733

          SHA512

          969807d1f8d8869b9c1fc8cdc1dcfb260ed57dfd732b28ca032b5d307f68f9e94c2492db838b28f071e937f310aaa2c11c8c504a479c4d580c74cdffa9e0a333

        • \Windows\system\svchost.exe

          Filesize

          67KB

          MD5

          9cb0df7d41bd5bac697181c0a6252e6c

          SHA1

          5f576bc5abf710bcbeb46ee700c507bfadb0dd6f

          SHA256

          ab3d8ab7ed81dc97de3d6cc380814e059527e56e96b1baf93bbe52095560934c

          SHA512

          7c80b6a5d0712b929d925617dae9d2d3ccddf185952d88e22c1b247e0ad577bf25178d3f05640ea82a0dd98b3cd9f6e30bdcabdb64f3c3ae9fda0bedb6679ce5

        • memory/1352-83-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1352-54-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/1352-1-0x0000000000020000-0x0000000000024000-memory.dmp

          Filesize

          16KB

        • memory/1352-84-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/1352-0-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1352-18-0x00000000030F0000-0x0000000003121000-memory.dmp

          Filesize

          196KB

        • memory/1352-17-0x00000000030F0000-0x0000000003121000-memory.dmp

          Filesize

          196KB

        • memory/1352-6-0x0000000000401000-0x000000000042E000-memory.dmp

          Filesize

          180KB

        • memory/1352-3-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1352-48-0x0000000000020000-0x0000000000024000-memory.dmp

          Filesize

          16KB

        • memory/1352-2-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/1716-35-0x0000000002710000-0x0000000002741000-memory.dmp

          Filesize

          196KB

        • memory/1716-62-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1716-102-0x0000000002710000-0x0000000002741000-memory.dmp

          Filesize

          196KB

        • memory/1716-99-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1716-87-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1716-19-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1716-24-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/1716-20-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/2724-58-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/2724-68-0x0000000002630000-0x0000000002661000-memory.dmp

          Filesize

          196KB

        • memory/2724-63-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2724-57-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2724-69-0x0000000002630000-0x0000000002661000-memory.dmp

          Filesize

          196KB

        • memory/2724-86-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2736-56-0x0000000002480000-0x00000000024B1000-memory.dmp

          Filesize

          196KB

        • memory/2736-79-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2736-49-0x0000000001C70000-0x0000000001CA1000-memory.dmp

          Filesize

          196KB

        • memory/2736-37-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB

        • memory/2736-45-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2764-77-0x0000000000400000-0x0000000000431000-memory.dmp

          Filesize

          196KB

        • memory/2764-71-0x0000000072940000-0x0000000072A93000-memory.dmp

          Filesize

          1.3MB